Near Optimal Routing in a Small-World Network with Augmented Local Awareness

Size: px
Start display at page:

Download "Near Optimal Routing in a Small-World Network with Augmented Local Awareness"

Transcription

1 Near Optimal Routing in a Small-World Network with Augmented Local Awareness arxiv:cs/ v3 [cs.dm] 30 Nov 2005 Jianyang Zeng Wen-Jing Hsu Jiangdian Wang November 11, 2018 Abstract In order to investigate the routing aspects of small-world networks, Kleinberg [13] proposes a network model based on a d-dimensional lattice with longrange links chosen at random according to the d-harmonic distribution. Kleinberg shows that the greedy routing algorithm by using only local information performs in O(lg 2 n) expected number of hops, where n denotes the number of nodes in the network. Martel and Nguyen [17] have found that the expected diameter of Kleinberg s small-world networks is Θ(lg n). Thus a question arises naturally: Can we improve the routing algorithms to match the diameter of the networks while keeping the amount of information stored on each node as small as possible? Existing approaches for improving the routing performance in the small-world networks include: (1) Increasing the number of long-range links [2, 15]; (2) Exploring more nodes before making routing decisions [14]; (3) Increasing the local awareness for each node [10, 17]. However, all these approaches can only achieve O ( (lgn) 1+ǫ) expected number of hops, where ǫ > 0 denotes a constant. We extend Kleinberg s model and add two augmented local links for each node, which are connected to nodes chosen randomly and uniformly within lg 2 n Mahattan distance. Our investigation shows that these augmented local connections can make small-world networks more navigable. We show that if each node is aware of O(lgn) number of neighbors via the augmented local links, there exist both non-oblivious and oblivious algorithms that can route messages between any pair of nodes in O(lgnlglgn) expected number of hops, which is a near optimal routing complexity and outperforms the other related results for routing in Kleinberg s small-world networks. Our schemes keep only O(lg 2 n) bits of routing information on each node, thus they are scalable with the network size. Our results imply that the awareness of O(lg n) nodes through Center for Advanced Information Systems, Nanyang Technological University, Nanyang Avenue, Singapore zengjy321@pmail.ntu.edu.sg. Nanyang Technological University, Nanyang Avenue, Singapore hsu@ntu.edu.sg. School of Electrical Electronic Engineering, Nanyang Technological University, Singapore. wang0059@pmail.ntu.edu.sg. 1

2 augmented links is more efficient for routing than via the local links [10, 17]. Besides adding new light to the studies of social networks, our results may also find applications in the design of large-scale distributed networks, such as peer-topeer systems, in the same spirit of Symphony [15]. 1 Introduction A well-known study by Milgram in 1967 [18] shows the small-world phenomenon [9], also called six degree of separation, that any two people in the world can be connected by a chain of six (on the average) acquaintances, and people can deliver messages efficiently to an unknown target via their acquaintances. This study is repeated by Dodds, Muhamad, and Watts [8] recently, and the results show that it is still true for today s social network. The small-world phenomenon has also been shown to be pervasive in networks from nature and engineering systems, such as the World Wide Web [21, 1], peer-to-peer systems [2, 16, 15, 22], etc. Recently, a number of network models have been proposed to study the small-world properties [19, 21, 13]. Watts and Strogatz [21] propose a random rewiring model whose diameter is a poly-logarithmic function of the size of the network. The model is constructed by adding a small number of random edges to nodes uniformly distributed on a ring, where nodes are connected densely with their near neighbors. A similar approach can also be found in Ballabás and Chung s earlier work [6], where the poly-logarithmic diameter of the random graph is achieved by adding a random matching to the nodes of a cycle. However, these models fail to capture the algorithmic aspects of a smallworld network [13]. As commented by Kleinberg in [13], the poly-logarithmic diameter of some graphs does not imply the existence of efficient routing algorithms. For example, the random graph in [6] yields a logarithmic diameter, yet any routing using only local information requires at least n expected number of hops (where n is the size of the network) [13]. In order to incorporate routing or navigating properties into random graph models, Kleinberg [13] develops a new model based on a d-dimensional torus lattice with long-range links chosen randomly from the d-harmonic distribution, i.e., a long-range link between nodes u and v exists with probability proportional to Dist(u,v) d, where Dist(u,v) denotes the Mahattan distance between nodes u and v. Based on this model, Kleinberg then shows that routing messages between any two nodes can be achieved in O(lg 2 n) 1 expected number of hops by applying a simple greedy routing algorithm using only local information. This bound is tightened to Θ(lg 2 n) later by Barrière et al. [3] and Martel et al. [17]. Further research [16, 14, 17, 10] shows that in fact the O(lg 2 n) bound of the original greedy routing algorithm can be improved by putting some extra information in each message holder. Manku, Naor, and Wieder [16] show that if each 1 The logarithmic symbol lg is with the base 2, if not otherwise specified. Also, we remove the ceiling or floor for simplicity throughout the paper. 2

3 message holder at a routing step takes its own neighbors neighbors into account for making routing decisions, the bound of routing complexity can be improved to O( lg2 n ), where qlgq q denotes the number of long-range contacts for each node. Lebhar and Schabanel [14] propose a routing algorithm for 1-dimensional Kleinberg s model, which visits O( lg2 n ) lg 2 (1+q) nodes on expectation before routing the message, and they show that a routing path with expected length of O( lgn(lglgn)2 ) can be found. Two research groups, Fraigniaud et lg 2 (1+q) al. [10], and Martel and Nguyen [17], independently report that if each node is aware of its O(lg n) closest local neighbors, the routing complexity in d-dimensional Kleinberg s small-world networks can be improved to O(lgnlg 1+1/d n) expected number of hops. The difference is that [17] requires keeping additional state information, while [10] uses an oblivious greedy routing algorithm. Fraigniaud et al. [10] also show that Θ(lg 2 n) bits of topological awareness per node is optimal for their oblivious routing scheme. In [17], Martel and Nguyen show that the expected diameter of a d-dimensional Kleinberg network is Θ(lgn). As such, there is still some room for reducing the routing complexity, which motivates our work. Other small-world models have also been studied. In their recent paper [20], Nguyen and Martel study the diameters of variants of Kleinberg s small-world models, and provide a general framework for constructing classes of small-world networks with Θ(lg n) expected diameter. Aspnes, Diamadi, and Shah [2] find that the greedy routing algorithms in directed rings with a constant number of random extra links given in any distribution requires at least Ω(lg 2 n/lglgn) expected number of hops. Another related models are the small-world percolation models [16, 4, 7, 5]. The diameters of these models are studied by Benjamin et al. [4], Coppersmith et al. [7] and Biskup [5]. The routing aspects of the percolation models, such as the lower bound and upper bound of greedy routing algorithms with 1-lookahead, are studied in [16]. Applications of small-world phenomenon in computer networks include efficient lookup in peer-to-peer systems [16, 2, 15, 22], gossip protocol in a communication network [12], flooding routing in ad-hoc networks [11], and the study of diameter of World Wide Web [1], etc. 1.1 Our Contributions We extend Kleinberg s structures of small-world models with slight change. Besides having long-range and local links on the grid lattice, each node is augmented with two extra links connected to nodes chosen randomly and uniformly within lg 2 n Mahattan distance. Based on this extended model, we present near optimal algorithms for decentralized routing with O(lgn) augmented awareness. We show that if each node is aware of O(lgn) number of nodes via the augmented neighborhood, there exist both non-oblivious and oblivious routing algorithms that perform in O(lgnlglgn) expected number of hops (see Theorem 1 and Theorem 2). Our investigation constructively show that the augmented local connections can make small-world networks more navigable. 3

4 Scheme #bits of awareness #steps expected Oblivious or Non-oblivious? Kleinberg s greedy [13, 2, 15] O(qlgn) O(lg 2 n/q) Oblivious NoN-greedy [16] O(q 2 lgn) O(lg 2 n/(qlgq)) Non-oblivious Decentralized algorithm in [14] O ( lg 2 n/lg(1+q) ) O ( (lgn) 2 /lg 2 (1+q) ) Non-oblivious Decentralized algorithm [17] O(lg 2 n) O ( (lgn) 1+1/d) Non-oblivious Indirect-greedy algorithm [10] O(lg 2 n) O ( (lgn) 1+1/d) Oblivious Our algorithms for the O(lg 2 n) O(lgn lglgn) Both are provided model with augmented awareness Table 1: Comparisons of our decentralized routing algorithms with the other existing schemes. In the first three schemes (in [13, 2, 15, 16, 14]), we suppose that each node has q long-range contacts, while in the next three schemes (in [17, 10] and this paper), we suppose that each node has one long-range contact. A routing protocol is oblivious if the message holder makes routing decisions only by its local information and the target node, and independently of the previous routing history, otherwise, it is said to be non-oblivious. A comparison of our algorithm with the other existing schemes is shown in Table 1. Our decentralized routing algorithms assume that each node can compute a shortest path among a poly-logarithmic number of known nodes. Such an assumption is reasonable since each node in a computer network is normally a processor and can carry out such a simple computation. Our schemes keep O(lg 2 n) bits of routing information stored on each node, thus they are scalable with the increase of network size. Our investigation shows that the awareness of O(lg n) nodes through the augmented links is more efficient for routing than via the local links [10, 17]. We note that besides adding new light to the studies of social networks such as Milgram s experiment [18], our results may also find applications in the design of large-scale distributed networks, such as peer-to-peer systems, in the same spirit of Symphony [15]. Since the links in our extended model are randomly constructed according to the probabilistic distribution, the network may be less vulnerable to adversarial attacks, and thus provide good fault tolerance. 1.2 Organization The rest of the paper is organized as follows. Section 2 gives notations for Kleinberg s small-world model and its extended version with augmented local connections. Section 3 gives some preliminary notations for decentralized routing. In Section 4, we propose both non-oblivious and oblivious routing algorithms with near optimal routing complexity in our extended model. Section 5 gives the experimental evaluation of our schemes. Section 6 briefly concludes the paper. 2 Definitions of Small-World Models In this section, we will give the definition of Kleinberg s small-world model and its extended version in which each node has extra links. For simplicity, we only consider the one-dimensional model with one long-range contact for each node. In addition, we assume that all links are directed, which is consistent with the real-world observation, for example, person x knows person y, but y may not know x. 4

5 Definition 1 (Kleinberg s Small-World Network (KSWN) [13]) A Kleinberg s Small-World Network, denoted as K, is based on a one-dimensional torus (or ring) [n] = [0,1,,n]. Each node u has a directed local link to its next neighbor (u+1) mod n on the ring. We refer to this local link as Ring-link (or R-link for short), and refer to node (u+1) mod n as the R-neighbor of node u. In addition, each node has one long-range link to another node chosen randomly according to the 1-harmonic distribution, that is, 1 the probability that node u sends a long-range link to node v is Pr[u v] =, Z u Dist(u,v) where Dist(u,v) denotes the ring distance 2 from u to v, and Z u = 1 z u. We Dist(u,z) refer to this long-range link as the Kleinberg-link (or K-link for short), and refer to node v as a K-neighbor of node u if a K-link exists from u to v. Our extended structure introduces several extra links for each node. Its definition is given below. Definition 2 (KSWN with Augmented Local Connections (KSWN*)) A Kleinberg s Small-World Network with Augmented Local Connections, denoted as K, has the same structure of KSWN, except that each node u in K has two extra links to nodes chosen randomly and uniformly from the interval (u,u + lg 2 n]. We refer to these two links as the augmented local links (or AL-links for short), and refer to node v as a AL-neighbor of node u if a AL-link exists from u to v. There are in total four links for each node in a KSWN*: one R-link, one K-link, two AL-links. We refer to all nodes linked directly by node u as the immediate neighbors of u. Our extended structure retains the same O(1) order of node degree as that of Kleinberg s original model. 3 Decentralized Routing Algorithms Based on the original model, Kleinberg presents a class of decentralized routing algorithms, in which each node makes routing decisions by using local information and in a greedy fashion. In other words, the message holder forward the message to its immediate neighboring node, including its K-neighbor, which is closest to the destination in terms of the Mahattan distance. Kleinberg shows that such a simple greedy algorithm performs in O(lg 2 n) expected number of hops. The other existing decentralized routing algorithms [2, 15, 14, 10, 17, 16] mainly rely on three approaches to improve routing performance: (1) Increasing the number of long-range links [2, 15]; (2) Exploring more nodes before making routing decisions [14]; (3) Increasing the local awareness for each node [10, 17]. However, so far using these approaches can only achieve O ( (lgn) 1+ǫ) expected number of hops in routing, where ǫ > 0. Although the scheme in [16], where each node makes routing decision by looking ahead its neighbors s neighbors, can achieve an optimal O(lgn/lglgn) bound, their result depends on the fact that each node has at least Ω(lg n) number of K-links. 2 or Mahattan distance for multi-dimensional models. 5

6 There are normally two approaches for decentralized routing: oblivious and nonoblivious schemes [10]. A routing protocol is oblivious if the message holder makes routing decisions only by its local information and the target node, and independently of the previous routing history. On the other hand, if the message holder needs to consider certain information of the previous routing history to make routing decisions, the protocol is referred to as non-oblivious. The non-oblivious protocol is often implemented by adding a header segment to the message packet so that the downstream nodes can learn the routing decisions of upstream nodes by reading the message header information. The scheme in [10] is oblivious, while the schemes in [14] and [17] are non-oblivious. We refer to the message holder as the current node. For the current node x, we define a sequence of node sets T 0,T 1,,T i,, where T 0 = {x}, T 1 = { u s AL-neighbors, u T 0 }, T 2 = {u s AL-neighbors, u T 1 }, and so on. We refer to T i as the set of nodes in the ith level of AL neighborhood, and let H i = j i T j denote the set of all nodes in the first i levels of AL neighborhood. At a certain level i of AL neighborhood, we may also refer to H i 1 as the set of previously known nodes. Let L i = T i H i 1 denote the set of new nodes discovered during the ith level of AL neighborhood. Let A x (k) = H k denote the augmented local awareness (or AL awareness for short) of a given node in a KSWN*, where each node is aware of the first k levels of its AL neighborhood. In Section 4, we will show that there exists a sufficiently large constant σ such that A x (lglgn) lgn/σ, based on which we propose both non-oblivious and oblivious routing algorithms running in O(lgnlglgn) expected number of hops and requiring O(lg 2 n) bits of information on each node. Our near optimal O(lgnlglgn) bound on the routing complexity outperforms the other related results for Kleinberg s small-world networks. To our knowledge, our algorithms achieve the best expected routing complexity while requiring at most O(log 2 n) bits of information stored on each node. 4 Near Optimal Routing with O(lg n) Awareness 4.1 Augmented Local Awareness of O(lg n) In this subsection, we will show that A x (lglgn), the number of distinct nodes that node x is aware of via the first lglgn levels of AL neighborhood, is not less than lgn/σ for a constant σ, which, as will be shown in Lemma 3, is sufficiently large to guarantee that A x (lglgn) contains a K-link that jumps over half distance (Suppose that the destination node is at a certain large distance from the current node). These results are useful for the subsequent analysis of our oblivious and non-oblivious routing schemes. Lemma 1 Let A x (lglgn) denote the AL awareness of node x in a KSWN* K, where each node is aware of lglgn levels of AL-neighbors. Then Pr[ A x (lglgn) lgn σ ] > ψ, where σ denotes a sufficiently large constant and ψ denotes a positive constant. 6

7 Proof: Throughout the proof, we assume that H i < lgn for all 1 i lglgn, σ otherwise, the lemma already holds, since A x (lglgn) = H lglgn > lgn/σ. We will show that at each level of AL neighborhood, the probability that each AL-link points to previously known nodes is small so that a large number of distinct nodes will be found via the first lglgn levels of AL neighborhood. Consider the construction of a AL-link for the current node x. By definition of KSWN*, each AL-link of x is connected to a node randomly and uniformly chosen from the interval (x,x + lg 2 n], that is, each AL-link of x points to a node in the interval (x,x+lg 2 n] withprobability (lgn) 2. Byassumption, therecouldbenomorethanlgn/σ previously knownnodesintheinterval (x,x+lg 2 n]. Thus, theprobabilityforaal-linkof agivennodetopoint toapreviously known nodeisatmost(lgn/σ) (lgn) 2 = (σlgn) 1. Thus, the probability for a AL-link of x to point to a new node is at least 1 (σlgn) 1. There are in total at most 2 H lglgn 2lgn/σ number of AL-links, so the probability for all AL-links to point to new nodes is at least (1 (σlgn) 1 ) 2lgn/σ 1 2 for σ 2 sufficiently large n. Here we use the fact (1+x) a 1+ax for x > 1 and a 1. When σ is a sufficiently large constant, we have Pr[ A x lgn ] > ψ for a positive constant σ ψ = 1 2 > 0. Thus, the proof of Lemma 1 is completed. σ Non-Oblivious Decentralized Routing Our non-oblivious routing algorithm is given as follows: Initially the source node s finds in its AL awareness A s (lglgn) an intermediate node z that is closest to the destination, and then computes a shortest path π from s to z in A s (lglgn). Before routing the message, s adds the information about shortest path π to the message header. Once the message passes a node on the shortest path π, the next stop is read off the header stack. When the message reaches node z, node z can tell that it is an intermediate target by reading the message header and then route the message to its K-neighbor. Such processes are repeated until the message reaches a certain node close enough to the destination node. After that, Kleinberg s plain greedy algorithm can be used to route the message effectively to the target node. Given a message M, a source node s and a target node t in a KSWN* K, the pseudocodes of our non-oblivious algorithm running on the current node x are given in Algorithm 1. Next we will analyze the performance of the Algorithm1. We first give a basic lemma, which provide a lower bound and an upper bound on the probability of the existence of a K-link in Kleinberg s small-world networks. Its proof can be found in Appendix A. Lemma 2 Let Pr[u v] K denote the probability that node u sends a K-link to node v in a KSWN* K. Suppose that a Dist(u,v) b, then c 1 Pr[u v] K c 2, where c blgn algn 1 and c 2 are constants independent of n. In Lemma 1, we have shown that Pr[ A x (lglgn) lgn/σ ] is at least a positive constant for a sufficiently large constant σ. Based on this result, Lemma 3 shows that the probability for A x (lglgn) to contain a K-link jumping over half distance is at least a positive constant. 7

8 Algorithm 1 Input: the source s, the target t and the message M. Initialization: Current node s. Set the header stack of the message M to be empty. while Distance between the current node and the destination (lgn) 2 lglgn do if the header stack of the message M is empty then Route the message M to x s K-neighbor y. Find an intermediate node z in A y(lglgn) whose K-neighbor is closest to t (ties are broken arbitrarily). Compute a shortest path π : x 0 = y,x 1,,x t = z from y to z, and push the shortest path information π : x 1,,x t = z into the header stack of the message M. else Pop up the first node x i from the header stack and route the message M to node x i. end if end while Final phase (Kleinberg s greedy algorithm): Route the message M to an immediate neighbor of x that is closest to the target t, until it reaches t. Lemma 3 Suppose that the distance between the current node x and the target node t in a KSWN* K is Dist(x,t) lg 2 nlglgn. Then with probability at least a positive constant, node x s AL awareness A x (lglgn) contains a K-neighbor within Dist(x,t)/2 distance to the target node t. Proof: Let A denote the event that A x (lglgn) lgn. By Lemma 1, we have Pr[A] > σ ψ for a constant ψ > 0. Let B l (t) denote the set of all nodes within l ring distance to t. Let Pr[x B K l (t)] denote the probability that x s K-neighbor is inside the ball B l (t). Let m = Dist(x,t). By Lemma 2, the probability for a K-link to point to a given node inside the ball Bm (t) is at least c 1, so we have 2 mlgn Pr[x K Bm 2 (t)] B m 2 (t) c 1 mlgn = m 2 c 1 mlgn c 3 lgn, where c 3 is a constant. Since Dist(x,t) lg 2 nlglgn and each AL-link spans a distance no more than lg 2 n, the nodes in AL awareness A x (lglgn) are all between the current node x and the target node t. Let Pr[A x (lglgn) K Bm (t)] denote the probability that at least one node in 2 A x (lglgn) has a K-neighbor in Bm(t). Then we have 2 Pr[A x (lglgn) K Bm (t)] Pr[A x(lglgn) K Bm (t) A] Pr[A] 2 2 ( 1 (1 c 3 )lgn σ ) ψ lgn ψ(1 e c 3 σ ), which islargerthanapositive constant. At thelast step, we obtain(1 c 3 lgn )lgn σ e c 3 σ by using the fact that (1+ b x )x e b for b R and x > 0. Lemma 4 Suppose that the distance between the current node x and the target node t in a KSWN* K is Dist(x,t) lg 2 nlglgn. Then after at most O(lgnlglgn) expected number of hops, Algorithm 1 will reduce the distance to within lg 2 nlglgn. 8

9 Proof: Since Dist(x,t) lg 2 nlglgn, all known nodes in x s AL awareness A x (lglgn) arebetweenthecurrentnodexandthetargetnodet. WecanapplytheresultinLemma3 to analyze Algorithm 1. We refer to the routing steps from a given node x to any node within A x (lglgn) as an indirect phase. The routings in different indirect phases are independent from each other. By Lemma 3, the probability that node x s AL awareness A x (lglgn) contains a K-neighbor within Dist(x,t)/2 distance to the target node t is at least a positive constant, so after at most O(1) expected number of indirect phases, Algorithm 1 will find an intermediate node whose K-link jumps over half distance. Since each indirect phase takes at most lglgn hops and the maximum distance is n, after at most O(lgn lglgn) expected number of hops, the message will reach a node within lg 2 nlglgn distance to the target node t. Lemma 5 Suppose that the distance between the current node x and the target node t in a *KSWN K is Dist(x,t) lg 2 nlglgn. Then using the final phase of Algorithm 1 (i.e. using Kleinberg s greedy algorithm) can route the message to the target node t in O(lgn) expected number of hops. Proof: When the distance Dist(x,t) lg 2 nlglgn, the final phase in Algorithm 1 is executed. By Kleinberg s results in [13], after at most O ( lg 2 (lg 2 nlglgn) ) = O(logn) expected number of steps, the message will be routed to the destination node. Combining the above lemmas, it is not difficult for us to obtain the routing complexity of Algorithm 1. Theorem 1 In a KSWN* K, Algorithm 1 performs in O(lgn lglgn) expected number of hops. 4.3 Oblivious Decentralized Routing In our oblivious scheme, when the distance is large, the current node x first finds in A x (lglgn) whether there is an intermediate node z, which contains a K-neighbor within Dist(x,t)/2 distance to the target node, and is closest to node x in terms of AL-links (any possible tie is broken arbitrarily). Next, node x computes a shortest path π from x to z among the AL awareness A x (lglgn), and then routes the message to its next ALneighbor on the shortest path π. When the distance is small, Kleinberg s plain greedy algorithm is applied. Given a message M, a source s and a target t in a KSWN* K, the pseudocodes of our oblivious algorithm running on the current node x are given in Algorithm 2. Lemma 6 Suppose that the distance between the current node x and the target node t in a KSWN* K is Dist(x,t) c(lgn) 2 lglgn, where c is a sufficiently large constant. Then after at most O(lglgn) expected number of hops, Algorithm 2 will reduce the distance to within Dist(x, t)/2. 9

10 Algorithm 2 Input: the source s, the target t and the message M. Initialization: Current node s. while Distance between the current node and the destination c(lgn) 2 lglgn do (c is a sufficiently large constant and will be given later) z a node in A x(lglgn) that contains a K-neighbor within Dist(x,t)/2 distance to t, and is closest to node x in terms of AL-links (ties are broken arbitrarily). if node z does not exist then Route the message M to an immediate neighbor closest to node t. else Compute a shortest path π from x to z among A x(lglgn). if π consists of only node x itself then Route the message M to the K-neighbor. else Route the message M to the next AL-neighbor on the shortest path π. end if end if end while Final phase (Kleinberg s greedy algorithm): Route the message M to an immediate neighbor of x that is closest to the target t, until it reaches t. PAL-link K-link x... z r r ' t Ax Figure 1: Diagram for oblivious decentralized routing. The shade area represents node x s AL awareness A x(lglgn). The target node t is on the right side of x. Node r is the midpoint of xt. Node r is between nodes r and t such that Dist(r,r ) = lg 2 n lglgn. Node z is an intermediate node in A x(lglgn) that contains a K-neighbor in rt (in rr or r t ) and is closest to x in terms of AL-links. Proof: As shown in Figure 1, node r is the midpoint of xt, and node r is between r and t such that Dist(r,r ) = lg 2 nlglgn. Let z be an intermediate node in A x (lglgn) that contains a K-neighbor between r and t, and is closest to x in terms of AL-links. We refer to a node z in x s AL awareness A x (lglgn) as a good intermediate node if it satisfies the following two conditions: (1) has a K-neighbor within Dist(x, t)/2 to the target node; (2) is closest to node x in terms of AL-links. Let π : x 0 = x,x 1,,x t = z denote a shortest path that x finds from itself to z among the AL awareness A x (lglgn). We divide the next routing into two cases according to the different locations of z s K-neighbor. In the first case, z s K-neighbor is within r t. Since the distance between x and the right most node in A x (lglgn) is at most lg 2 nlglgn, z s K-neighbor is also within Dist(x i,t)/2 to the target node for every x i on the shortest path π, that is, node z always satisfies the first condition of a good intermediate node for every node x i. Also, if z is an intermediate node closest to x, it is also a closest intermediate node to every x i on the shortest path π, that is, z also satisfies the second condition of a good intermediate node for every node x i. Therefore, node z will become a fixed good intermediate node for all nodes x i on the shortest path. When this case happens, Algorithm 2 will route the message along a shortest path from x to z in an oblivious routing fashion. Thus, in this case, after at most lglgn number of hops, the message will reach a good intermediate 10

11 node and the routing distance will be reduced by half 3. In the second case, z s K- neighbor is within rr. When this happens, the intermediate node z may change for each x i on the shortest path π : x 0 = x,x 1,,x t = z, and the message may not be routed along the shortest path as expected by the previous node x. However, we will show that the latter case will not happen very likely, since the length of rr is relatively small when Dist(x,t) c(lgn) 2 lglgn for a sufficiently large constant c. Let F 1 denote the event that A x (lglgn) contains a K-neighbor in r t. By using a similar technique in Lemma 3, we can easily obtain that F 1 occurs with probability at least a positive constant. Let F 2 denote the event that A x (lglgn) contains a K-neighbor in rr. For any node y in A x (lglgn), we have Dist(y,r) 1 3 c(lgn)2 lglgn when c is a sufficiently large constant. By Lemma 2, the probability for a node y in A x (lglgn) to send a K-link to a node in rr 3c is at most 2. Because there are in total c(lgn) 2 (lglgn) lgn lg2 nlglgn nodes in rr, a node in A x (lglgn) has a K-neighbor in rr 3c with probability at most 2 c(lgn) 2 (lglgn) lgn lg2 nlglgn = 3c 2. Since A clgn x(lglgn) lglgn 2lgn, the event F 2, i.e., A x (lglgn) has a K-neighbor in rr 3c, occurs with probability at most 2 2lgn = 6c 2, which is clgn c smaller than a certain constant when c is a sufficiently large constant. Thus, we have Pr[ F 2 ] > γ for a constant γ > 0, if we choose a sufficiently large constant c. Therefore, Pr[ F 2 F1 ] is larger than a positive constant, if we choose a sufficiently large constant c. Thus, after at most c lglgn expected number of hops for a constant c, the event F 2 F1 will occur, that is, a message will be routed to a node x whose AL awareness A x (lglgn) contains a K-neighbor in r t, but no K-neighbor in rr. When such a node x is reached, the intermediate node z is fixed for every node x i on a shortest path π : x 0 = x,x 1,,x t = z in an oblivious routing fashion. Then after at most lglgn number of hops, the message will be routed to the fixed intermediate node z, which has a K-link jumping over half distance. Therefore, after at most c lglgn+lglgn = O(lglgn) expected number of hops, the distance will be reduced by half. Lemma 7 Suppose that the distance between the current node x and the target node t in a KSWN* K is Dist(x,t) clg 2 nlglgn, where c is a sufficiently large constant. Then after at most O(lgnlglgn) expected number of hops, Algorithm 2 will reduce the distance to within clg 2 nlglgn. Proof: The proof is similar to that of Lemma 4, and hence is omitted here. Lemma 8 Suppose that the distance between current node x and the target node t in a KSWN* K is m < c(lgn) 2 lglgn, where c is a sufficiently large constant. Then using the final phase of Algorithm 2 (i.e. using Kleinberg s greedy algorithm) can route the message to the target node t in O(lgn) expected number of hops. 3 There may be more than one good intermediate nodes z when a tie happens. However, even when this happens, the message will still reach one of good intermediate nodes along a shortest path finally. Hereinafter, we focus on the case in which the good intermediate node z is unique for the current node x. The analysis for the case with multiple good intermediate nodes can be easily obtained. 11

12 Proof: The proof is similar to that of Lemma 5, and hence is omitted here. Combining the above lemmas, we can easily obtain the following theorem. Theorem 2 In a KSWN* K, Algorithm 2 performs in O(lgn lglgn) expected number of hops. 5 Experimental Evaluation In this section, we will conduct experiments to evaluate our schemes and other existing routing schemes for Kleinberg s small-world networks. We focus on the following four schemes: (a) The original greedy routing algorithm[13] in Kleinberg s small-world network with only one long-range contact per node. Each node forwards the message to its immediate neighbor closest to the destination; (b) The greedy routing algorithm in Kleiberg s small-world network with two long-range contacts per node [2, 15]. In the experimental study, we would like to learn how much the additional number of long-range links can help routing. (c) The decentralized routing scheme with O(lgn) local awareness [10, 17]. With this scheme, we intend to evaluate the degree at which the local awareness improve the routing efficiency. (d) Our near optimal routing scheme proposed in this paper. We note that most schemes have both non-oblivious and oblivious versions. Here we only focus on the non-oblivious version for each scheme. 5.1 Experimental Setup Network Construction: We construct the small-world network based on a ring [0, 1,,n]. Each node i is connected to its immediate neighbors (i + 1) mod n. Let H n = n i=11/i denote the harmonic normalization factor. We then generate a sequence of intervals I(i), which we call the probability intervals, where 1 i n 1. Let 0 < I 1 1 1/H n, and (i 1)H n < I i 1 ih n, where 2 i n 1. Each node i uniformly generates a random number x in (0,1], and then finds the interval that contains x. Suppose that x is located in the interval I k. Node i then forms a long-range link connected to a node with the distance k. When each node has multiple long-range contacts, it just generates more than one random numbers, and sets up the connections in the same way. In the extension of Kleinberg s small-world networks, each node uniformly and randomly chooses two nodes within the Manhattan distance lg 2 n as its augmented local neighbors. Messages Generation and Evaluation Metrics: We let each node generate a query message with a random destination, and then evaluate the following metrics. (1) Average length of routing path is the average number of hops travelled by the messages from the source to the destination. (2) Storage requirement for each node is the number of information bits required to be stored on each node. 12

13 5.2 Experimental Results We vary the number of nodes in the network from 5,000 to 25,000, and evaluate different routing schemes, as shown in Figures 2 and 3. For large n, the greedy algorithm with increasing number of long-range contacts [2, 15], the decentralized routing algorithm with local awareness [10, 17], our near optimal and algorithm all improve Kleinberg s original greedy algorithm. Our near optimal scheme can find a shorter routing path than the decentralized routing schemes with local awareness [10, 17], while keep almost the same storage space on each node. 60 Greedy with 1 long range contact 55 Greedy with 2 long range contacts Algorithm with log n local awareness 50 Our near optimal algorithm Latency (number of hops) Number of nodes x 10 Figure 2: Average length of routing paths for different routing schemes. 250 Greedy with 1 long range contact Greedy with 2 long range contacts Algorithm with log n local awareness 200 Our near optimal algorithm Number of bits information Number of nodes x 10 4 Figure 3: Storage requirement on each node for different routing schemes. 13

14 6 Conclusion We extend Kleinberg s small-world network with augmented local links, and show that if each node participating in routing is aware of O(lg n) neighbors via augmented links, there exist both non-oblivious and oblivious decentralized algorithms that can finish routing in O(lgnlglgn) expected number of hops, which is a near optimal routing complexity. Our investigation shows that the awareness of O(lg n) nodes through the augmented links will be more efficient for routing than via the local links [10, 17]. Our extended model may provide an important supplement for the modelling of smallworld phenomenon, and may better approximate the real-world observation. For example, each person in a human society is very likely to increase his/her activities randomly within some certain communities, and thus is aware of certain levels of augmented acquaintances. This augmented awareness would surely help delivery the message to an unknown target in the society. Our results may also find applications in the design of large-scale distributed networks, such as distributed storage systems. Unlike most existing deterministic frameworks for distributed systems, our extended small-world networks may provide good fault tolerance, since the links in the networks are constructed probabilistically and less vulnerable to adversarial attacks. References [1] R. Albert, H. Jeong, and A.-L. Barabasi. The diameter of the World Wide Web. Nature, 401(9): , [2] J. Aspnes, Z. Diamadi, and G. Shah. Fault-tolerant routing in peer-to-peer systems. In Proceedings of PODC 02, pages , [3] L. Barriére, P. Fraigniaud, E. Kranakis, and D. Krizanc. Efficient routing in networks with long range contacts. In Proceedings of the 15th International Symposium on Distributed Computing (DISC 01), pages , [4] I. Benjamini and N. Berger. The Diameter of Long-Range Percolation Clusters on Finite Cycles. Random Structures and Algorithms, 19(2): , [5] M. Biskup. Graph diameter in long-range percolation. Submitted to Electron. Comm. Probab, [6] B. Bollobás and F.R.K. Chung. The Diameter of a cycle plus a random matching. SIAM Journal on Discrete Mathematics, 1(3): , [7] D. Coppersmith, D. Gamarnik, and M. Sviridenko. The diameter of a long-range percolation graph. Random Structures and Algorithms, 21(1):1 13,

15 [8] P. Dodds, R. Muhamad, and D. Watts. An experimental study of search in global social networks. Science, 301: , [9] M. Kochen Ed. The small world (Ablex, Norwood) [10] P. Fraigniaud, C. Gavoille, and C. Paul. Eclecticism shrinks even small worlds. In PODC 2004, pages , [11] C.M. Homan and G. Istrate. Small worlds, locality, and flooding on landscapes. Research Report TR , Department of Computer Science, University of Rochester, USA, [12] D. Kemper, J. Kleinberg, and A. Demers. Spatial gossip and resource location protocols. In Proceedings of STOC, pages , [13] J. Kleinberg. The Small-World Phenomenon: An Algorithmic Perspective. In Proceedings of the 32nd ACM Symposium on Theory of Computing, pages , [14] E. Lebhar and N. Schabanel. Almost optimal decentralized routing in long-range contact networks. In ICALP 2004, pages , [15] G. S. Manku, M. Bawa, and P. Raghavan. Symphony: Distributed hashing in a small world. In Proceedings of the 4th USENIX Symposium on Internet Technologies and Systems, pages , [16] G.S. Manku, M. Naor, and U. Wieder. Know thy neighbor s neighbor: The power of lookahead in randomized p2p networks. In Proceedings of STOC 2004, pages 54 63, [17] C. Martel and V. Nguyen. Analyzing Kleinberg s (and other) small-world models. In PODC 2004, pages , [18] S. Milgram. The small world problem. Psychology Today, 61, [19] M.E.J. Newman. Models of the small world. J. Stat. Phys., 101, [20] V. Nguyen and C. Martel. Analyzing and Characterizing Small-World Graphs. In SODA 2005, [21] D. Watts and S. Strogatz. Collective dynamics of small-world networks. Nature, 393: , [22] H. Zhang, A. Goel, and R. Govindan. Using the small-world model to improve Freenet performance. In Proceedings of IEEE INFOCOM 2002, pages ,

16 Appendix A. Proof of Lemma 2 Lemma 2. Let Pr[u v] K denote the probability that node u sends a K-link to node v in a KSWN* K. Suppose that a Dist(u,v) b, then c 1 Pr[u v] K c 2, where blgn algn c 1 and c 2 are constants independent of n. Proof: The probability that node v is a K-neighbor of node u is Pr[u v] K 1 = where Dist(u,v) is the ring distance between nodes u and v, and Z v = z v Dist(u,v)Z v, 1. Dist(v,z) Observe that Z v = n U i i=1, where U i i is the set of all nodes at distance i away to node v. Since U i = Θ(1), we have Z v = n Θ(1) i=1 = Θ(lgn). i c Since a Dist(u,v) b, we have 1 < Pr[u v] K < c 2, for some constants c blgn algn 1 and c 2 independent of n. Thus the lemma follows. 16

ReCord: A Distributed Hash Table with Recursive Structure

ReCord: A Distributed Hash Table with Recursive Structure ReCord: A Distributed Hash Table with Recursive Structure Jianyang Zeng and Wen-Jing Hsu Abstract We propose a simple distributed hash table called ReCord, which is a generalized version of Randomized-

More information

Generalized Cost Analysis for Decentralized Search over Metric-embedded Networks

Generalized Cost Analysis for Decentralized Search over Metric-embedded Networks Generalized Cost Analysis for Decentralized Search over Metric-embedded Networks Stephen Macke Stanford University smacke@cs.stanford.edu ABSTRACT For this project, we consider the problem of routing messages

More information

arxiv:cs/ v1 [cs.ds] 7 Jul 2006

arxiv:cs/ v1 [cs.ds] 7 Jul 2006 The Evolution of Navigable Small-World Networks Oskar Sandberg, Ian Clarke arxiv:cs/0607025v1 [cs.ds] 7 Jul 2006 February 1, 2008 Abstract Small-world networks, which combine randomized and structured

More information

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web

More information

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Relaxing Routing Table to Alleviate Dynamism in P2P Systems Relaxing Routing Table to Alleviate Dynamism in P2P Systems Hui FANG 1, Wen Jing HSU 2, and Larry RUDOLPH 3 1 Singapore-MIT Alliance, National University of Singapore 2 Nanyang Technological University,

More information

Distributed Network Routing Algorithms Table for Small World Networks

Distributed Network Routing Algorithms Table for Small World Networks Distributed Network Routing Algorithms Table for Small World Networks Mudit Dholakia 1 1 Department of Computer Engineering, VVP Engineering College, Rajkot, 360005, India, Email:muditdholakia@gmail.com

More information

Overlay (and P2P) Networks

Overlay (and P2P) Networks Overlay (and P2P) Networks Part II Recap (Small World, Erdös Rényi model, Duncan Watts Model) Graph Properties Scale Free Networks Preferential Attachment Evolving Copying Navigation in Small World Samu

More information

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search

Math 443/543 Graph Theory Notes 10: Small world phenomenon and decentralized search Math 443/543 Graph Theory Notes 0: Small world phenomenon and decentralized search David Glickenstein November 0, 008 Small world phenomenon The small world phenomenon is the principle that all people

More information

Degree Optimal Deterministic Routing for P2P Systems

Degree Optimal Deterministic Routing for P2P Systems Degree Optimal Deterministic Routing for P2P Systems Gennaro Cordasco Luisa Gargano Mikael Hammar Vittorio Scarano Abstract We propose routing schemes that optimize the average number of hops for lookup

More information

Small-world networks

Small-world networks Small-world networks c A. J. Ganesh, University of Bristol, 2015 Popular folklore asserts that any two people in the world are linked through a chain of no more than six mutual acquaintances, as encapsulated

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Scalable P2P architectures

Scalable P2P architectures Scalable P2P architectures Oscar Boykin Electrical Engineering, UCLA Joint work with: Jesse Bridgewater, Joseph Kong, Kamen Lozev, Behnam Rezaei, Vwani Roychowdhury, Nima Sarshar Outline Introduction to

More information

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200?

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? Questions from last time Avg. FB degree is 200 (suppose).

More information

6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks

6. Overview. L3S Research Center, University of Hannover. 6.1 Section Motivation. Investigation of structural aspects of peer-to-peer networks , University of Hannover Random Graphs, Small-Worlds, and Scale-Free Networks Wolf-Tilo Balke and Wolf Siberski 05.12.07 * Original slides provided by K.A. Lehmann (University Tübingen, Germany) 6. Overview

More information

Peer-to-Peer Data Management

Peer-to-Peer Data Management Peer-to-Peer Data Management Wolf-Tilo Balke Sascha Tönnies Institut für Informationssysteme Technische Universität Braunschweig http://www.ifis.cs.tu-bs.de 10. Networkmodels 1. Introduction Motivation

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

TELCOM2125: Network Science and Analysis

TELCOM2125: Network Science and Analysis School of Information Sciences University of Pittsburgh TELCOM2125: Network Science and Analysis Konstantinos Pelechrinis Spring 2015 Figures are taken from: M.E.J. Newman, Networks: An Introduction 2

More information

M.E.J. Newman: Models of the Small World

M.E.J. Newman: Models of the Small World A Review Adaptive Informatics Research Centre Helsinki University of Technology November 7, 2007 Vocabulary N number of nodes of the graph l average distance between nodes D diameter of the graph d is

More information

Geographical routing 1

Geographical routing 1 Geographical routing 1 Routing in ad hoc networks Obtain route information between pairs of nodes wishing to communicate. Proactive protocols: maintain routing tables at each node that is updated as changes

More information

Neighbor Selection and Hitting Probability in Small-World Graphs

Neighbor Selection and Hitting Probability in Small-World Graphs Neighbor Selection and Hitting Probability in Small-World Graphs Oskar Sandberg October 25, 2007 Abstract Small-world graphs, which combine randomized and structured elements, are seen as prevalent in

More information

Flat Routing on Curved Spaces

Flat Routing on Curved Spaces Flat Routing on Curved Spaces Dmitri Krioukov (CAIDA/UCSD) dima@caida.org Berkeley April 19 th, 2006 Clean slate: reassess fundamental assumptions Information transmission between nodes in networks that

More information

arxiv: v1 [cs.ds] 7 Apr 2008

arxiv: v1 [cs.ds] 7 Apr 2008 Adaptive Dynamics of Realistic Small-World Networks Olof Mogren Oskar Sandberg Vilhelm Verendel Devdatt Dubhashi April 8, 2008 arxiv:080.111v1 [cs.ds] Apr 2008 Abstract Continuing in the steps of Jon Kleinberg

More information

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008

Lesson 4. Random graphs. Sergio Barbarossa. UPC - Barcelona - July 2008 Lesson 4 Random graphs Sergio Barbarossa Graph models 1. Uncorrelated random graph (Erdős, Rényi) N nodes are connected through n edges which are chosen randomly from the possible configurations 2. Binomial

More information

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds

MAE 298, Lecture 9 April 30, Web search and decentralized search on small-worlds MAE 298, Lecture 9 April 30, 2007 Web search and decentralized search on small-worlds Search for information Assume some resource of interest is stored at the vertices of a network: Web pages Files in

More information

Small-World Datacenters

Small-World Datacenters 2 nd ACM Symposium on Cloud Computing Oct 27, 2011 Small-World Datacenters Ji-Yong Shin * Bernard Wong +, and Emin Gün Sirer * * Cornell University + University of Waterloo Motivation Conventional networks

More information

Highway Dimension and Provably Efficient Shortest Paths Algorithms

Highway Dimension and Provably Efficient Shortest Paths Algorithms Highway Dimension and Provably Efficient Shortest Paths Algorithms Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Joint with Ittai Abraham, Amos Fiat, and Renato

More information

Complex Networks and Decentralized Search Algorithms

Complex Networks and Decentralized Search Algorithms Complex Networks and Decentralized Search Algorithms Jon Kleinberg Abstract. The study of complex networks has emerged over the past several years as a theme spanning many disciplines, ranging from mathematics

More information

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University Fractional Cascading in Wireless Sensor Networks Jie Gao Computer Science Department Stony Brook University 1 Sensor Networks Large number of small devices for environment monitoring 2 My recent work Lightweight,

More information

An efficient implementation of the greedy forwarding strategy

An efficient implementation of the greedy forwarding strategy An efficient implementation of the greedy forwarding strategy Hannes Stratil Embedded Computing Systems Group E182/2 Technische Universität Wien Treitlstraße 3 A-1040 Vienna Email: hannes@ecs.tuwien.ac.at

More information

Spatial Distribution in Routing Table Design for Sensor Networks

Spatial Distribution in Routing Table Design for Sensor Networks Spatial Distribution in Routing Table Design for Sensor Networks Rik Sarkar Xianjin Zhu Jie Gao Department of Computer Science, Stony Brook University. {rik, xjzhu, jgao}@cs.sunysb.edu Abstract We propose

More information

Comparing the strength of query types in property testing: The case of testing k-colorability

Comparing the strength of query types in property testing: The case of testing k-colorability Comparing the strength of query types in property testing: The case of testing k-colorability Ido Ben-Eliezer Tali Kaufman Michael Krivelevich Dana Ron Abstract We study the power of four query models

More information

Lesson 18. Laura Ricci 08/05/2017

Lesson 18. Laura Ricci 08/05/2017 Lesson 18 WATTS STROGATZ AND KLEINBERG MODELS 08/05/2017 1 SMALL WORLD NETWORKS Many real networks are characterized by a diameter very low. In several social networks, individuals tend to group in clusters

More information

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols

From Static to Dynamic Routing: Efficient Transformations of Store-and-Forward Protocols SIAM Journal on Computing to appear From Static to Dynamic Routing: Efficient Transformations of StoreandForward Protocols Christian Scheideler Berthold Vöcking Abstract We investigate how static storeandforward

More information

CSE 190 Lecture 16. Data Mining and Predictive Analytics. Small-world phenomena

CSE 190 Lecture 16. Data Mining and Predictive Analytics. Small-world phenomena CSE 190 Lecture 16 Data Mining and Predictive Analytics Small-world phenomena Another famous study Stanley Milgram wanted to test the (already popular) hypothesis that people in social networks are separated

More information

A COMPARISON OF MESHES WITH STATIC BUSES AND HALF-DUPLEX WRAP-AROUNDS. and. and

A COMPARISON OF MESHES WITH STATIC BUSES AND HALF-DUPLEX WRAP-AROUNDS. and. and Parallel Processing Letters c World Scientific Publishing Company A COMPARISON OF MESHES WITH STATIC BUSES AND HALF-DUPLEX WRAP-AROUNDS DANNY KRIZANC Department of Computer Science, University of Rochester

More information

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.

More information

Randomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees

Randomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees Randomized Algorithms 2017A - Lecture 10 Metric Embeddings into Random Trees Lior Kamma 1 Introduction Embeddings and Distortion An embedding of a metric space (X, d X ) into a metric space (Y, d Y ) is

More information

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE

March 10, Distributed Hash-based Lookup. for Peer-to-Peer Systems. Sandeep Shelke Shrirang Shirodkar MTech I CSE for for March 10, 2006 Agenda for Peer-to-Peer Sytems Initial approaches to Their Limitations CAN - Applications of CAN Design Details Benefits for Distributed and a decentralized architecture No centralized

More information

A Framework for Peer-To-Peer Lookup Services based on k-ary search

A Framework for Peer-To-Peer Lookup Services based on k-ary search A Framework for Peer-To-Peer Lookup Services based on k-ary search Sameh El-Ansary Swedish Institute of Computer Science Kista, Sweden Luc Onana Alima Department of Microelectronics and Information Technology

More information

III Data Structures. Dynamic sets

III Data Structures. Dynamic sets III Data Structures Elementary Data Structures Hash Tables Binary Search Trees Red-Black Trees Dynamic sets Sets are fundamental to computer science Algorithms may require several different types of operations

More information

Near-Optimal Hot-Potato Routing on Trees

Near-Optimal Hot-Potato Routing on Trees Near-Optimal Hot-Potato Routing on Trees Costas Busch 1, Malik Magdon-Ismail 1, Marios Mavronicolas 2, and Roger Wattenhofer 3 1 Rensselaer Polytechnic Institute, Troy, NY 12180, USA 2 University of Cyprus,

More information

Complex Networks. Structure and Dynamics

Complex Networks. Structure and Dynamics Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck

More information

6 Distributed data management I Hashing

6 Distributed data management I Hashing 6 Distributed data management I Hashing There are two major approaches for the management of data in distributed systems: hashing and caching. The hashing approach tries to minimize the use of communication

More information

Example 1: An algorithmic view of the small world phenomenon

Example 1: An algorithmic view of the small world phenomenon Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 1: Jan 17, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 1: An algorithmic view of the small world phenomenon The story

More information

6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model

6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model 6.207/14.15: Networks Lecture 5: Generalized Random Graphs and Small-World Model Daron Acemoglu and Asu Ozdaglar MIT September 23, 2009 1 Outline Generalized random graph models Graphs with prescribed

More information

Graph Model Selection using Maximum Likelihood

Graph Model Selection using Maximum Likelihood Graph Model Selection using Maximum Likelihood Ivona Bezáková Adam Tauman Kalai Rahul Santhanam Theory Canal, Rochester, April 7 th 2008 [ICML 2006 (International Conference on Machine Learning)] Overview

More information

Ian Clarke Oskar Sandberg

Ian Clarke Oskar Sandberg Ian Clarke is the architect and coordinator of The Freenet Project, and the Chief Executive Officer of Cematics Ltd, a company he founded to realise commercial applications for the Freenet technology.

More information

Kleinberg s Small-World Networks. Normalization constant have to be calculated:

Kleinberg s Small-World Networks. Normalization constant have to be calculated: Kleinberg s Small-World Networks Normalization constant have to be calculated: r v u d v u P ), ( 1 ~ ) ( Z v u d v u P r 1 ), ( 1 ) ( u i r i u d Z ), ( 1 Example Choose among 3 friends (1-dimension)

More information

Online Facility Location

Online Facility Location Online Facility Location Adam Meyerson Abstract We consider the online variant of facility location, in which demand points arrive one at a time and we must maintain a set of facilities to service these

More information

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes

Small World Properties Generated by a New Algorithm Under Same Degree of All Nodes Commun. Theor. Phys. (Beijing, China) 45 (2006) pp. 950 954 c International Academic Publishers Vol. 45, No. 5, May 15, 2006 Small World Properties Generated by a New Algorithm Under Same Degree of All

More information

SmartGossip: : an improved randomized broadcast protocol for sensor networks

SmartGossip: : an improved randomized broadcast protocol for sensor networks SmartGossip: : an improved randomized broadcast protocol for sensor networks Presented by Vilas Veeraraghavan Advisor Dr. Steven Weber Presented to the Center for Telecommunications and Information Networking

More information

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1

Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science

More information

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions

Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College

More information

ECS 289 / MAE 298, Lecture 9 April 29, Web search and decentralized search on small-worlds

ECS 289 / MAE 298, Lecture 9 April 29, Web search and decentralized search on small-worlds ECS 289 / MAE 298, Lecture 9 April 29, 2014 Web search and decentralized search on small-worlds Announcements HW2 and HW2b now posted: Due Friday May 9 Vikram s ipython and NetworkX notebooks posted Project

More information

Switching for a Small World. Vilhelm Verendel. Master s Thesis in Complex Adaptive Systems

Switching for a Small World. Vilhelm Verendel. Master s Thesis in Complex Adaptive Systems Switching for a Small World Vilhelm Verendel Master s Thesis in Complex Adaptive Systems Division of Computing Science Department of Computer Science and Engineering Chalmers University of Technology Göteborg,

More information

Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd

Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd Small-World Overlay P2P Networks: Construction and Handling Dynamic Flash Crowd Ken Y.K. Hui John C. S. Lui David K.Y. Yau Dept. of Computer Science & Engineering Computer Science Department The Chinese

More information

Content Overlays. Nick Feamster CS 7260 March 12, 2007

Content Overlays. Nick Feamster CS 7260 March 12, 2007 Content Overlays Nick Feamster CS 7260 March 12, 2007 Content Overlays Distributed content storage and retrieval Two primary approaches: Structured overlay Unstructured overlay Today s paper: Chord Not

More information

Distriubted Hash Tables and Scalable Content Adressable Network (CAN)

Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Distriubted Hash Tables and Scalable Content Adressable Network (CAN) Ines Abdelghani 22.09.2008 Contents 1 Introduction 2 2 Distributed Hash Tables: DHT 2 2.1 Generalities about DHTs............................

More information

Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs

Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs Javad Akbari Torkestani Department of Computer Engineering, Islamic Azad University, Arak Branch,

More information

An Efficient Method for Constructing a Distributed Depth-First Search Tree

An Efficient Method for Constructing a Distributed Depth-First Search Tree An Efficient Method for Constructing a Distributed Depth-First Search Tree S. A. M. Makki and George Havas School of Information Technology The University of Queensland Queensland 4072 Australia sam@it.uq.oz.au

More information

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems

Advanced Distributed Systems. Peer to peer systems. Reference. Reference. What is P2P? Unstructured P2P Systems Structured P2P Systems Advanced Distributed Systems Peer to peer systems Karl M. Göschka Karl.Goeschka@tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ AdvancedDistributedSystems/ What is P2P Unstructured P2P Systems

More information

Diversity Coloring for Distributed Storage in Mobile Networks

Diversity Coloring for Distributed Storage in Mobile Networks Diversity Coloring for Distributed Storage in Mobile Networks Anxiao (Andrew) Jiang and Jehoshua Bruck California Institute of Technology Abstract: Storing multiple copies of files is crucial for ensuring

More information

Exercise set #2 (29 pts)

Exercise set #2 (29 pts) (29 pts) The deadline for handing in your solutions is Nov 16th 2015 07:00. Return your solutions (one.pdf le and one.zip le containing Python code) via e- mail to Becs-114.4150@aalto.fi. Additionally,

More information

arxiv:cs/ v1 [cs.ir] 26 Apr 2002

arxiv:cs/ v1 [cs.ir] 26 Apr 2002 Navigating the Small World Web by Textual Cues arxiv:cs/0204054v1 [cs.ir] 26 Apr 2002 Filippo Menczer Department of Management Sciences The University of Iowa Iowa City, IA 52242 Phone: (319) 335-0884

More information

Peer-to-Peer Networks Pastry & Tapestry 4th Week

Peer-to-Peer Networks Pastry & Tapestry 4th Week Peer-to-Peer Networks Pastry & Tapestry 4th Week Department of Computer Science 1 Peer-to-Peer Networks Pastry 2 2 Pastry Peter Druschel Rice University, Houston, Texas now head of Max-Planck-Institute

More information

Online Algorithms. Lecture 11

Online Algorithms. Lecture 11 Online Algorithms Lecture 11 Today DC on trees DC on arbitrary metrics DC on circle Scheduling K-server on trees Theorem The DC Algorithm is k-competitive for the k server problem on arbitrary tree metrics.

More information

Cuckoo Hashing for Undergraduates

Cuckoo Hashing for Undergraduates Cuckoo Hashing for Undergraduates Rasmus Pagh IT University of Copenhagen March 27, 2006 Abstract This lecture note presents and analyses two simple hashing algorithms: Hashing with Chaining, and Cuckoo

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

Architecture-Dependent Tuning of the Parameterized Communication Model for Optimal Multicasting

Architecture-Dependent Tuning of the Parameterized Communication Model for Optimal Multicasting Architecture-Dependent Tuning of the Parameterized Communication Model for Optimal Multicasting Natawut Nupairoj and Lionel M. Ni Department of Computer Science Michigan State University East Lansing,

More information

ECS 253 / MAE 253, Lecture 10 May 3, Web search and decentralized search on small-world networks

ECS 253 / MAE 253, Lecture 10 May 3, Web search and decentralized search on small-world networks ECS 253 / MAE 253, Lecture 10 May 3, 2018 Web search and decentralized search on small-world networks Announcements First example of the problems introduced by using software routines rather than working

More information

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons

Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Peer-to-peer networks: pioneers, self-organisation, small-world-phenomenons Patrick Baier October 10, 2008 Contents 1 Introduction 1 1.1 Preamble.................................... 1 1.2 Definition....................................

More information

arxiv: v1 [cs.ni] 28 Apr 2015

arxiv: v1 [cs.ni] 28 Apr 2015 Succint greedy routing without metric on planar triangulations Pierre Leone, Kasun Samarasinghe Computer Science Department, University of Geneva, Battelle A, route de Drize 7, 1227 Carouge, Switzerland

More information

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University Course website: http://snap.stanford.edu/na09 Slides will be available online Reading material will be posted online:

More information

Data Streaming Algorithms for Geometric Problems

Data Streaming Algorithms for Geometric Problems Data Streaming Algorithms for Geometric roblems R.Sharathkumar Duke University 1 Introduction A data stream is an ordered sequence of points that can be read only once or a small number of times. Formally,

More information

HEAPS ON HEAPS* Downloaded 02/04/13 to Redistribution subject to SIAM license or copyright; see

HEAPS ON HEAPS* Downloaded 02/04/13 to Redistribution subject to SIAM license or copyright; see SIAM J. COMPUT. Vol. 15, No. 4, November 1986 (C) 1986 Society for Industrial and Applied Mathematics OO6 HEAPS ON HEAPS* GASTON H. GONNET" AND J. IAN MUNRO," Abstract. As part of a study of the general

More information

Small World Overlay P2P Networks

Small World Overlay P2P Networks Small World Overlay P2P Networks Ken Y. K. Hui and John C. S. Lui Department of Computer Science & Engineering The Chinese University of Hong Kong Shatin, Hong Kong ykhui,cslui @cse.cuhk.edu.hk David K.

More information

Ad hoc and Sensor Networks Chapter 10: Topology control

Ad hoc and Sensor Networks Chapter 10: Topology control Ad hoc and Sensor Networks Chapter 10: Topology control Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity

More information

Lecture 7: Asymmetric K-Center

Lecture 7: Asymmetric K-Center Advanced Approximation Algorithms (CMU 18-854B, Spring 008) Lecture 7: Asymmetric K-Center February 5, 007 Lecturer: Anupam Gupta Scribe: Jeremiah Blocki In this lecture, we will consider the K-center

More information

RAQ: A Range-Queriable Distributed Data Structure

RAQ: A Range-Queriable Distributed Data Structure RAQ: A Range-Queriable Distributed Data Structure Hamid Nazerzadeh Mohammad Ghodsi Abstract Different structures are used in peer-to-peer networks to represent their inherently distributed, self-organized

More information

Onroad Vehicular Broadcast

Onroad Vehicular Broadcast Onroad Vehicular Broadcast Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian, Marwan Krunz Electrical and Computer Engineering University of Arizona

More information

Networks: A Deterministic Approach with Constant Overhead

Networks: A Deterministic Approach with Constant Overhead Trace-Routing in 3D Wireless Sensor Networks: A Deterministic Approach with Constant Overhead Su Xia, Hongyi Wu, and Miao Jin! School of Computing and Informatics! University of Louisiana at Lafayette

More information

Ad hoc and Sensor Networks Topology control

Ad hoc and Sensor Networks Topology control Ad hoc and Sensor Networks Topology control Goals of this chapter Networks can be too dense too many nodes in close (radio) vicinity This chapter looks at methods to deal with such networks by Reducing/controlling

More information

Complex Contagions Models in Opportunistic Mobile Social Networks

Complex Contagions Models in Opportunistic Mobile Social Networks Complex Contagions Models in Opportunistic Mobile Social Networks Yunsheng Wang Dept. of Computer Science Kettering University, Flint, MI 4854 Jie Wu Dept. of Computer and Info. Sciences Temple University,

More information

Faster, Space-Efficient Selection Algorithms in Read-Only Memory for Integers

Faster, Space-Efficient Selection Algorithms in Read-Only Memory for Integers Faster, Space-Efficient Selection Algorithms in Read-Only Memory for Integers Timothy M. Chan 1, J. Ian Munro 1, and Venkatesh Raman 2 1 Cheriton School of Computer Science, University of Waterloo, Waterloo,

More information

Online algorithms for clustering problems

Online algorithms for clustering problems University of Szeged Department of Computer Algorithms and Artificial Intelligence Online algorithms for clustering problems Ph.D. Thesis Gabriella Divéki Supervisor: Dr. Csanád Imreh University of Szeged

More information

arxiv:math/ v2 [math.pr] 12 Nov 2008

arxiv:math/ v2 [math.pr] 12 Nov 2008 The Annals of Applied Probability 2008, Vol. 18, No. 5, 1771 1793 DOI: 10.1214/07-AAP499 c Institute of Mathematical Statistics, 2008 arxiv:math/0702325v2 [math.pr] 12 Nov 2008 NEIGHBOR SELECTION AND HITTING

More information

The Structure of Information Networks. Jon Kleinberg. Cornell University

The Structure of Information Networks. Jon Kleinberg. Cornell University The Structure of Information Networks Jon Kleinberg Cornell University 1 TB 1 GB 1 MB How much information is there? Wal-Mart s transaction database Library of Congress (text) World Wide Web (large snapshot,

More information

PEER-TO-PEER (P2P) systems are now one of the most

PEER-TO-PEER (P2P) systems are now one of the most IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 1, JANUARY 2007 15 Enhancing Peer-to-Peer Systems Through Redundancy Paola Flocchini, Amiya Nayak, Senior Member, IEEE, and Ming Xie Abstract

More information

Lecture 9: (Semi-)bandits and experts with linear costs (part I)

Lecture 9: (Semi-)bandits and experts with linear costs (part I) CMSC 858G: Bandits, Experts and Games 11/03/16 Lecture 9: (Semi-)bandits and experts with linear costs (part I) Instructor: Alex Slivkins Scribed by: Amr Sharaf In this lecture, we will study bandit problems

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

Lecture 2 February 4, 2010

Lecture 2 February 4, 2010 6.897: Advanced Data Structures Spring 010 Prof. Erik Demaine Lecture February 4, 010 1 Overview In the last lecture we discussed Binary Search Trees(BST) and introduced them as a model of computation.

More information

Combinatorial Problems on Strings with Applications to Protein Folding

Combinatorial Problems on Strings with Applications to Protein Folding Combinatorial Problems on Strings with Applications to Protein Folding Alantha Newman 1 and Matthias Ruhl 2 1 MIT Laboratory for Computer Science Cambridge, MA 02139 alantha@theory.lcs.mit.edu 2 IBM Almaden

More information

1 The Traveling Salesperson Problem (TSP)

1 The Traveling Salesperson Problem (TSP) CS 598CSC: Approximation Algorithms Lecture date: January 23, 2009 Instructor: Chandra Chekuri Scribe: Sungjin Im In the previous lecture, we had a quick overview of several basic aspects of approximation

More information

Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks

Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks Distributed Detection in Sensor Networks: Connectivity Graph and Small World Networks SaeedA.AldosariandJoséM.F.Moura Electrical and Computer Engineering Department Carnegie Mellon University 5000 Forbes

More information

Worst-case running time for RANDOMIZED-SELECT

Worst-case running time for RANDOMIZED-SELECT Worst-case running time for RANDOMIZED-SELECT is ), even to nd the minimum The algorithm has a linear expected running time, though, and because it is randomized, no particular input elicits the worst-case

More information

Symphony. Symphony. Acknowledgement. DHTs: : The Big Picture. Spectrum of DHT Protocols. Distributed Hashing in a Small World

Symphony. Symphony. Acknowledgement. DHTs: : The Big Picture. Spectrum of DHT Protocols. Distributed Hashing in a Small World Distributed Hashing in a Small World Gurmeet Singh Manku Stanford University with Mayank Bawa and Prabhakar Raghavan Acknowledgement The following slides are borrowed from the author s talk at USITS 2003.

More information

An Enhanced Bloom Filter for Longest Prefix Matching

An Enhanced Bloom Filter for Longest Prefix Matching An Enhanced Bloom Filter for Longest Prefix Matching Gahyun Park SUNY-Geneseo Email: park@geneseo.edu Minseok Kwon Rochester Institute of Technology Email: jmk@cs.rit.edu Abstract A Bloom filter is a succinct

More information

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007

Topic: Local Search: Max-Cut, Facility Location Date: 2/13/2007 CS880: Approximations Algorithms Scribe: Chi Man Liu Lecturer: Shuchi Chawla Topic: Local Search: Max-Cut, Facility Location Date: 2/3/2007 In previous lectures we saw how dynamic programming could be

More information

Structure of Social Networks

Structure of Social Networks Structure of Social Networks Outline Structure of social networks Applications of structural analysis Social *networks* Twitter Facebook Linked-in IMs Email Real life Address books... Who Twitter #numbers

More information

IN a mobile ad hoc network, nodes move arbitrarily.

IN a mobile ad hoc network, nodes move arbitrarily. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make

More information